The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomaly with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (15) 1983-1987 (15) 1988-1990 (18) 1991-1993 (19) 1994-1995 (15) 1996-1997 (21) 1998 (16) 1999 (18) 2000 (26) 2001 (28) 2002 (51) 2003 (91) 2004 (152) 2005 (219) 2006 (254) 2007 (295) 2008 (359) 2009 (332) 2010 (227) 2011 (283) 2012 (281) 2013 (314) 2014 (383) 2015 (432) 2016 (548) 2017 (640) 2018 (891) 2019 (1190) 2020 (1525) 2021 (1801) 2022 (2287) 2023 (2698) 2024 (623)
Publication types (Num. hits)
article(7536) book(5) data(17) incollection(60) inproceedings(8240) phdthesis(208) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1918 occurrences of 879 keywords

Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Ahmed Belkhirat, Abdelghani Bouras, Abdelkader Belkhir A New Similarity Measure for the Anomaly Intrusion Detection. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF weighted bipartite graph, anomaly detection, similarity measure
19Hyunhee Park, Meejoung Kim, Chul-Hee Kang F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adaptive defense system, Traffic analysis and measurment, Anomaly detection, Fisher linear discriminant
19Sung Deok Cha, Junsup Lee, Sangrok Kim, Sanghyun Cho ADAM: Web Anomaly Detection Assistant Based on Feature Matrix. Search on Bibsonomy QSIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, anomaly detection, web security, web data mining
19Chia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin Anomaly Behavior Analysis for Web Page Inspection. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious webpage, Anomaly behavior, Drive-by download
19Li He, Shunzheng Yu, Min Li Anomaly Detection Based on Available Bandwidth Estimation. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF available bandwidth measurement, anomaly detection, active measurement
19Panagiotis Papadimitriou 0002, Ali Dasdan, Hector Garcia-Molina Web graph similarity for anomaly detection (poster). Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF graph similarity, web graph lsh, anomaly detection
19Christian Callegari, Stefano Giordano, Michele Pagano Application of Wavelet Packet Transform to Network Anomaly Detection. Search on Bibsonomy NEW2AN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Best Basis, Anomaly Detection, IDS, Wavelet Packet
19Qi Gao 0004, Feng Qin, Dhabaleswar K. Panda 0001 DMTracker: finding bugs in large-scale parallel programs by detecting anomaly in data movements. Search on Bibsonomy SC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel programs, anomaly detection, data movements, bug detection
19Michael J. Chapple, Nitesh V. Chawla, Aaron Striegel Authentication anomaly detection: a case study on a virtual private network. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, data mining, authentication, anomaly detection, virtual private network
19Anmol Sheth, Christian Doerr, Dirk Grunwald, Richard Han 0001, Douglas C. Sicker MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. Search on Bibsonomy MobiSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless networks, anomaly detection, self-healing
19J. Treurniet Detecting low-profile scans in TCP anomaly event data. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed scan detection, scan detection, slow scan detection, network security, TCP, anomaly detection
19Dipankar Dasgupta, Senhua Yu, Nivedita Sumi Majumdar MILA - multilevel immune learning algorithm and its application to anomaly detection. Search on Bibsonomy Soft Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Humoral immune response, Anomaly detection, Artificial immune systems
19Christoph C. Michael, Anup K. Ghosh Simple, state-based approaches to program-based anomaly detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF machine learning, intrusion detection, Anomaly detection, finite automata, information system security
19Alexandr Seleznyov, Oleksiy Mazhelis Learning temporal patterns for anomaly intrusion detection. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly intrusion detection, network security, pattern matching, online learning, behavior profiling
19Christoph C. Michael, Anup K. Ghosh Two State-based Approaches to Program-based Anomaly Detection. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF state-based approaches, program-based anomaly detection, intrusion detection algorithms, execution audit data, statistical deviation monitoring, finite state machines, finite-state machine, security of data, software performance evaluation, experimental results, auditing, n-grams, algorithm performance
19Eric L. Miller 0001 A scale-recursive, statistically-based method for anomaly characterization in images based upon observations of scattered radiation. Search on Bibsonomy ICIP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF electromagnetic wave scattering, terrestrial electricity, geophysical prospecting, statistically-based method, nonlinear scattering model, anomaly characterization, scattered radiation, scale-recursive algorithm, measured fields, estimation-theoretic techniques, decision-theoretic techniques, low-frequency inverse conductivity problem, image processing, statistical analysis, images, decision theory, inverse problems, recursive estimation, geophysical signal processing, geophysical signal processing, Maxwell equations, Maxwell's equation
14Hamza Rahmani, Nabil Sahli, Farouk Kamoun Joint Entropy Analysis Model for DDoS Attack Detection. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Feng Gu 0006, Julie Greensmith, Uwe Aickelin Exploration of the Dendritic Cell Algorithm Using the Duration Calculus. Search on Bibsonomy ICARIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Shin Ando, Einoshin Suzuki Detection of unique temporal segments by information theoretic meta-clustering. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information-theoretic meta-clustering, temporal data mining
14Zhenyun Zhuang, Ying Li, Zesheng Chen PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Hwai-Jung Hsu, Feng-Jian Wang Using Artifact Flow Diagrams to Model Artifact Usage Anomalies. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin Database Intrusion Detection Using Role Profiling with Role Hierarchy. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Role profiling, Intrusion detection, RBAC, Database security, Insider threats
14James J. Treinen, Ramakrishna Thurimella Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Daisuke Mashima, Mustaque Ahamad Using identity credential usage logs to detect anomalous service accesses. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity theft and misuse detection, online access log monitoring, risk scoring
14Wei Lu 0018, Hengjian Tong Detecting Network Anomalies Using CUSUM and EM Clustering. Search on Bibsonomy ISICA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, Intrusion detection
14Haakon Ringberg, Augustin Soule, Jennifer Rexford WebClass: adding rigor to manual labeling of traffic anomalies. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF database, data sharing, network traffic analysis, data labeling
14Claudio Piciarelli, Christian Micheloni, Gian Luca Foresti Trajectory-Based Anomalous Event Detection. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Vandana Pursnani Janeja, Vijayalakshmi Atluri Random Walks to Identify Anomalous Free-Form Spatial Scan Windows. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jan Feyereisl, Uwe Aickelin ToLeRating UR-STD. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Udayan Deshpande, Chris McDonald, David Kotz Refocusing in 802.11 Wireless Measurement. Search on Bibsonomy PAM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jianning Mai, Lihua Yuan, Chen-Nee Chuah Detecting BGP anomalies with wavelet. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Ping Du, Shunji Abe, Yusheng Ji, Seisho Sato, Makio Ishiguro Detecting and Tracing Traffic Volume Anomalies in SINET3 Backbone Network. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Syed A. Khayam, Hayder Radha, Dmitri Loguinov Worm Detection at Network Endpoints Using Information-Theoretic Traffic Perturbations. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Zhengdao Zhang, Zhumiao Peng, Zhiping Zhou The Study of Intrusion Prediction Based on HsMM. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Arun Vishwanath, Vijay Sivaraman Routers With Very Small Buffers: Anomalous Loss Performance for Mixed Real-Time and TCP Traffic. Search on Bibsonomy IWQoS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Xiaodong Lin 0001 RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Paramvir Bahl, Ranveer Chandra, Patrick P. C. Lee, Vishal Misra, Jitendra Padhye, Dan Rubenstein, Yan Yu Opportunistic use of client repeaters to improve performance of WLANs. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Tie-Shan Zhao, Zeng-zhi Li, Ze-ming Wang, Xiaofen Lin An Approach to Model Normal Network Behaviors Based on Entire Network Packets. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Said Mirza Pahlevi, Isao Kojima Semantic grid resource monitoring and discovery with rule processing based on the time-series statistical data. Search on Bibsonomy GRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji The Evolution of System-Call Monitoring. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Vincent S. Tseng, Lee-Cheng Chen, Chao-Hui Lee, Jin-Shang Wu, Yu-Chia Hsu Development of a Vital Sign Data Mining System for Chronic Patient Monitoring. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Stéphane P. A. Bordas, James G. Conley, Brian Moran, Joe Gray, Ed Nichols A simulation-based design paradigm for complex cast components. Search on Bibsonomy Eng. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Casting design and modeling, Extended finite element method, XFEM, Crack growth and damage tolerance analysis, Non-destructive evaluation, Industrial problems, Micro-macro simulations
14Oleg Kuybeda, David Malah, Meir Barzohar Rank Estimation and Redundancy Reduction of High-Dimensional Noisy Signals With Preservation of Rare Vectors. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection. Search on Bibsonomy ECBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14David Pérez-Díaz De Cerio, José Luis Valenzuela Perceptual Evaluation and Enhancement of VoIP Over IEEE 802.11e. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Thomas Stibor, Jonathan Timmis Comments on real-valued negative selection vs. real-valued positive selection and one-class SVM. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Katja Luther, Rainer Bye, Tansu Alpcan, Achim Müller, Sahin Albayrak A Cooperative AIS Framework for Intrusion Detection. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Elisa Bertino, Ashish Kamra, James P. Early Profiling Database Application to Detect SQL Injection Attacks. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood Evolving Buffer Overflow Attacks with Detector Feedback. Search on Bibsonomy EvoWorkshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Birger Tödtmann, Stephan Riebach, Erwin P. Rathgeb The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Federico Maggi, Stefano Zanero On the Use of Different Statistical Tests for Alert Correlation - Short Paper. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Hongli Luo, Mei-Ling Shyu Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Hongli Luo, Mei-Ling Shyu Defense against Bandwidth Attacks with Traffic Resource Management. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Pin Lu, Kai Shen Multi-Layer Event Trace Analysis for Parallel I/O Performance Tuning. Search on Bibsonomy ICPP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Sun Yong Kim, Miyuki Imada, Masakatsu Ohta Detecting Anomalous Events in Ubiquitous Sensor Environments using Bayesian Networks and Nonparametric Regression. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hui Zang, Tao Ye Impact of Packet Sampling on Portscan Detection. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Eamonn J. Keogh, Jessica Lin 0001, Ada Wai-Chee Fu, Helga Van Herle Finding Unusual Medical Time-Series Subsequences: Algorithms and Applications. Search on Bibsonomy IEEE Trans. Inf. Technol. Biomed. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Yacine Bouzida, Frédéric Cuppens Detecting Known and Novel Network Intrusions. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF visualization, routing, network security, BGP
14Wei Wang 0012, Roberto Battiti Identifying Intrusions in Computer Networks with Principal Component Analysis. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jianyun Xu, Andrew H. Sung, Qingzhong Liu Tree Based Behavior Monitoring for Adaptive Fraud Detection. Search on Bibsonomy ICPR (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Xinguang Peng, Junfeng Zhang Program Detection with Context Dependency for Collaborative Services. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Security, Security Policy, Firewalls, Anomalies, Packet Filters
14Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai Actively Modifying Control Flow of Program for Efficient Anormaly Detection. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Gregory R. Madey, Gábor Szabó 0002, Albert-László Barabási WIPER: The Integrated Wireless Phone Based Emergency Response System. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Chung-Ju Wu, Sheng-Yuan Chen, Jenq Kuen Lee Copy Propagation Optimizations for VLIW DSP Processors with Distributed Register Files. Search on Bibsonomy LCPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Yao Wang, Ming-Zeng Hu, Bin Li, Bo-Ru Yan Tracking Anomalous Behaviors of Name Servers by Mining DNS Traffic. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Kyubum Wee, Sinjae Kim Construction of Finite Automata for Intrusion Detection from System Call Sequences by Genetic Algorithms. Search on Bibsonomy PAKDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Zonghua Zhang, Hong Shen 0001 Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Vandana Pursnani Janeja, Vijayalakshmi Atluri FS3: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection. Search on Bibsonomy ICDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Dongyong Yang, Jungan Chen The T-detectors maturation algorithm based on match range model. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF T-cells maturation, match range, negative selection
14Rosario Giuseppe Garroppo, Stefano Giordano, Stefano Lucetti, Luca Tavanti Achieving Flow Isolation in 802.11 Networks with the DTT Scheduler. Search on Bibsonomy EuroNGI Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Stefano Zanero Analyzing TCP Traffic Patterns Using Self Organizing Maps. Search on Bibsonomy ICIAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Zoltán Porkoláb, István Zólyomi A Feature Composition Problem and a Solution Based on C++ Template Metaprogramming. Search on Bibsonomy GTTSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Bruce D. Caulkins, Joohan Lee, Morgan C. Wang Packet- vs. Session-Based Modeling for Intrusion Detection Systems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Yiru Li, Anil Somayaji Securing Email Archives through User Modeling. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14David Whyte, Paul C. van Oorschot, Evangelos Kranakis Detecting Intra-enterprise Scanning Worms based on Address Resolution. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Tianrui Li 0001, Wuming Pan Intrusion detection system based on new association rule mining model. Search on Bibsonomy GrC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Nong Ye, Yebin Zhang, Connie M. Borror Robustness of the Markov-chain model for cyber-attack detection. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Fernando Godínez, Dieter Hutter, Raúl Monroy Attribute Reduction for Effective Intrusion Detection. Search on Bibsonomy AWIC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Brian D. Carrier, Blake Matheny Methods for Cluster-Based Incident Detection. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Ke Zhang 0026, Amy Yen, Xiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Lixia Zhang 0001 On Detection of Anomalous Routing Dynamics in BGP. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Ehab Al-Shaer Managing firewall and network-edge security policies. Search on Bibsonomy NOMS (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Christophe Mues, Jan Vanthienen Improving the Scalability of Rule Base Verification Using Binary Decision Diagrams: An Empirical Study. Search on Bibsonomy KI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Christophe Mues, Jan Vanthienen Efficient Rule Base Verification Using Binary Decision Diagrams. Search on Bibsonomy DEXA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Zhenhe Guo, Zhengkai Liu, Ying Tan 0002 An NN-Based Malicious Executables Detection Algorithm Based on Immune Principles. Search on Bibsonomy ISNN (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Anelise Munaretto, Mauro Fonseca, Khaldoun Al Agha, Guy Pujolle Fair Time Sharing Protocol: A Solution for IEEE 802.11b Hot Spots. Search on Bibsonomy ICT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14P. Ramasubramanian, Arputharaj Kannan Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System. Search on Bibsonomy ADBIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Quickprop Prediction Technique, Neural Networks, Multi-Agents, Database Security
14Joshua Oldmeadow, Siddarth Ravinutala, Christopher Leckie Adaptive Clustering for Network Intrusion Detection. Search on Bibsonomy PAKDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Armando Fox, Emre Kiciman, David A. Patterson 0001 Combining statistical monitoring and predictable recovery for self-management. Search on Bibsonomy WOSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Dongyong Yang, Jungan Chen The T-Detectors Maturation Algorithm Based on Genetic Algorithm. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Dina Q. Goldin, Ayferi Kutlu, Mingjun Song, Fuzheng Yang The Constraint Database Framework: Lessons Learned from CQA/CDB. Search on Bibsonomy ICDE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Bharat K. Bhargava, Yuhui Zhong, Yunhua Lu Fraud Formalization and Detection. Search on Bibsonomy DaWaK The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Yi-an Huang, Wei Fan 0001, Wenke Lee, Philip S. Yu Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Derek Armstrong, Sam Carter, Gregory L. Frazier, Tiffany M. Frazier A Controller-Based Autonomic Defense System. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Ruo Ando, Yoshiyasu Takefuji Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Shambhu J. Upadhyaya Real-Time Intrusion Detection with Emphasis on Insider Attacks. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Tsuyoshi Ohta, Hideto Kinoshita, Takahiro Kimata, Tadanori Mizuno A Framework of an Assertion-Based Algorithmic Debugging for Distributed Programs. Search on Bibsonomy ICOIN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 16067 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license